Security

Cloud Security in the form of data protection, user authentication and access control is the most pressing concern for Cloud usage, according to Computer World. The Gartner CIO Survey 2015 indicates 40% of all enterprises will require strong security as a pre-condition for using any type of cloud services by 2017. PSL’s security is unmatched with AES encryption, two-factor authentication, unique digital certificates, password policy management, advanced system permission rules, invisible token technology, and new on-line token activation.

How Does 2-Factor Authentication Work?

Two-factor authentication bases security not only around something you know, such as a user name and password, but also includes something you have, referred to as a “token.” This token can be a physical device, like your smartphone, or a piece of software, known as a soft token. The token generates a dynamic one time password(OTP) based on a unique algorithm and is seeded to each individual user. When you want to access your account, the user generates an OTP with their token and the system verifies it to grant access.

Cyber Security Solutions

Threat Analysis & Development

Reverse Engineering & Malware Analysis

Vulnerability Assessments

Network Intrusion Detection & Response

Rapid software development & analysis of cyber security capabilities

Innovative solutions in support of the comprehensive National Cyber Security Initiative